On security arguments of the second round SHA-3 candidates.
Elena AndreevaAndrey BogdanovBart MenninkBart PreneelChristian RechbergerPublished in: Int. J. Inf. Sec. (2012)
Keyphrases
- access control
- information security
- security systems
- information assurance
- security level
- security policies
- security issues
- security requirements
- functional requirements
- computer security
- statistical databases
- network security
- database
- security protocols
- data security
- intrusion detection
- security properties
- security problems
- security management
- similarity measure